summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html')
-rw-r--r--testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html53
1 files changed, 0 insertions, 53 deletions
diff --git a/testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html b/testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html
deleted file mode 100644
index c1c815d49e..0000000000
--- a/testing/web-platform/tests/fenced-frame/csp-transparent-url.https.html
+++ /dev/null
@@ -1,53 +0,0 @@
-<!DOCTYPE html>
-<title>Test transparent url navigated in fenced frame interacting with CSP</title>
-<script src="/resources/testharness.js"></script>
-<script src="/resources/testharnessreport.js"></script>
-<script src="/common/utils.js"></script>
-<script src="/common/dispatcher/dispatcher.js"></script>
-<script src="resources/utils.js"></script>
-
-<body>
-<script>
-function setupCSP(csp) {
- let meta = document.createElement('meta');
- meta.httpEquiv = "Content-Security-Policy";
- meta.content = "fenced-frame-src " + csp;
- document.head.appendChild(meta);
-}
-
-const allowedCSPs = ["*", "https:", "'self'"];
-allowedCSPs.forEach((csp) => {
- promise_test(async(t) => {
- setupCSP(csp);
-
- t.step_timeout(t.unreached_func(
- "The fenced frame should load for CSP fenced-frame-src " + csp), 3000);
-
- const fencedframe = attachFencedFrameContext();
- await fencedframe.execute(() => {});
- }, "Fenced frame loaded for CSP fenced-frame-src " + csp);
-});
-
-const blockedCSPs = ["'none'"];
-blockedCSPs.forEach((csp) => {
- promise_test(async(t) => {
- setupCSP(csp);
-
- const csp_violation = new Promise(resolve => {
- window.addEventListener("securitypolicyviolation", resolve);
- });
-
- const fencedframe = attachFencedFrameContext();
-
- const fencedframe_loaded = fencedframe.execute(() => {});
- fencedframe_loaded.then(t.unreached_func(
- "The fenced frame should not load for CSP fenced-frame-src " + csp));
-
- const csp_violation_event = await csp_violation;
- const remote_url = getRemoteContextURL(location.origin).toString();
- assert_true(csp_violation_event.blockedURI.includes(remote_url),
- "blockedURI should include the url");
- }, "Fenced frame blocked for CSP fenced-frame-src " + csp);
-});
-</script>
-</body>